mirror of
https://github.com/dev-sec/ansible-collection-hardening
synced 2024-11-10 09:14:18 +00:00
Make ssh client password login configurable.
Defaults to not allow which might be a bit restrictive.
This commit is contained in:
parent
ba7afdf938
commit
10f6544f3c
2 changed files with 4 additions and 1 deletions
|
@ -17,6 +17,9 @@ ssh_server_weak_hmac: false # sshd
|
|||
ssh_client_weak_kex: false # ssh
|
||||
ssh_server_weak_kex: false # sshd
|
||||
|
||||
# If true, password login is allowed. For sshd, it is always set to no password login.
|
||||
ssh_client_password_login: false # ssh
|
||||
|
||||
# ports to which ssh-server should listen to and ssh-client should connect to
|
||||
ssh_ports: ['22'] # sshd + ssh
|
||||
|
||||
|
|
|
@ -125,7 +125,7 @@ RhostsRSAAuthentication no
|
|||
RSAAuthentication yes
|
||||
|
||||
# Disable password-based authentication, it can allow for potentially easier brute-force attacks.
|
||||
PasswordAuthentication no
|
||||
PasswordAuthentication {{ 'yes' if ssh_client_password_login else 'no' }}
|
||||
|
||||
# Only use GSSAPIAuthentication if implemented on the network.
|
||||
GSSAPIAuthentication no
|
||||
|
|
Loading…
Reference in a new issue